CVE-2020-17438
Summary
| CVE | CVE-2020-17438 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2020-12-11 23:15:00 UTC |
| Updated | 2020-12-15 16:34:00 UTC |
| Description | An issue was discovered in uIP 1.0, as used in Contiki 3.0 and other products. The code that reassembles fragmented packets fails to properly validate the total length of an incoming packet specified in its IP header, as well as the fragmentation offset value specified in the IP header. By crafting a packet with specific values of the IP header length and the fragmentation offset, attackers can write into the .bss section of the program (past the statically allocated buffer that is used for storing the fragmented data) and cause a denial of service in uip_reass() in uip.c, or possibly execute arbitrary code on some target architectures. |
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|
| VU#815128 - Embedded TCP/IP stacks have memory corruption vulnerabilities |
MISC |
www.kb.cert.org |
Third Party Advisory, US Government Resource |
| Multiple Embedded TCP/IP Stacks | CISA |
MISC |
us-cert.cisa.gov |
Third Party Advisory, US Government Resource |
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 174892 SUSE Enterprise Linux Security Update for open-iscsi (SUSE-SU-2021:1164-1)
- 591123 Schneider Electric Modicon TM5 modules Multiple Vulnerabilities (SEVD-2021-285-06)
- 670372 EulerOS Security Update for open-iscsi (EulerOS-SA-2021-1953)
- 670393 EulerOS Security Update for open-iscsi (EulerOS-SA-2021-1932)